Review of recent detection methods for HTTP DDoS attack

GA Jaafar, SM Abdullah, S Ismail - Journal of Computer …, 2019 - Wiley Online Library
With increment in dependency on web technology, a commensurate increase has been
noted in destructive attempts to disrupt the essential web technologies, hence leading to …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

[HTML][HTML] Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection

D Alghazzawi, O Bamasag, H Ullah, MZ Asghar - Applied Sciences, 2021 - mdpi.com
DDoS (Distributed Denial of Service) attacks have now become a serious risk to the integrity
and confidentiality of computer networks and systems, which are essential assets in today's …

Voting extreme learning machine based distributed denial of service attack detection in cloud computing

GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …

[HTML][HTML] An adaptive distributed denial of service attack prevention technique in a distributed environment

B Riskhan, HAJ Safuan, K Hussain, AAH Elnour… - Sensors, 2023 - mdpi.com
Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed
setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This …

[PDF][PDF] A meta-analytic review of intelligent intrusion detection techniques in cloud computing environment

MG Raj, SK Pani - … Journal of Advanced Computer Science and …, 2021 - academia.edu
Security and data privacy continue to be major considerations in the selection and study of
cloud computing. Organizations are migrating more critical operations to the cloud, resulting …

Malicious Domain Names Detection Algorithm Based on N‐Gram

H Zhao, Z Chang, G Bao, X Zeng - Journal of Computer …, 2019 - Wiley Online Library
Malicious domain name attacks have become a serious issue for Internet security. In this
study, a malicious domain names detection algorithm based on N‐Gram is proposed. The …

Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing

O Bamasag, A Alsaeedi, A Munshi… - PeerJ Computer …, 2022 - peerj.com
In recent years, the advent of cloud computing has transformed the field of computing and
information technology. It has been enabling customers to rent virtual resources and take …

DDOS attack identification using machine learning techniques

S Peneti, E Hemalatha - 2021 International conference on …, 2021 - ieeexplore.ieee.org
One of the major problems that the world faces today is cyber attacks. Denial of Service
attacks have been one of most frequent attacks. Some of the mitigating techniques are …

Analysis of IoT bots against DDOS attack using machine learning algorithm

K Gurulakshmi, A Nesarani - 2018 2nd International …, 2018 - ieeexplore.ieee.org
With the rapid growth of Network Industry more diverse devices are connected and shares
their information with each other. Many Technologies such as Cloud Computing, Internet of …